/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- * vim: set ts=4 sw=4 et tw=80: * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "mozJSSubScriptLoader.h" #include "mozJSComponentLoader.h" #include "mozJSLoaderUtils.h" #include "nsIServiceManager.h" #include "nsIXPConnect.h" #include "nsIURI.h" #include "nsIIOService.h" #include "nsIChannel.h" #include "nsIInputStream.h" #include "nsNetCID.h" #include "nsDependentString.h" #include "nsAutoPtr.h" #include "nsNetUtil.h" #include "nsIProtocolHandler.h" #include "nsIFileURL.h" #include "nsScriptLoader.h" #include "jsapi.h" #include "jsdbgapi.h" #include "jsfriendapi.h" #include "nsJSPrincipals.h" #include "mozilla/scache/StartupCache.h" #include "mozilla/scache/StartupCacheUtils.h" #include "mozilla/Preferences.h" using namespace mozilla::scache; using namespace JS; /* load() error msgs, XXX localize? */ #define LOAD_ERROR_NOSERVICE "Error creating IO Service." #define LOAD_ERROR_NOURI "Error creating URI (invalid URL scheme?)" #define LOAD_ERROR_NOSCHEME "Failed to get URI scheme. This is bad." #define LOAD_ERROR_URI_NOT_LOCAL "Trying to load a non-local URI." #define LOAD_ERROR_NOSTREAM "Error opening input stream (invalid filename?)" #define LOAD_ERROR_NOCONTENT "ContentLength not available (not a local URL?)" #define LOAD_ERROR_BADCHARSET "Error converting to specified charset" #define LOAD_ERROR_BADREAD "File Read Error." #define LOAD_ERROR_READUNDERFLOW "File Read Error (underflow.)" #define LOAD_ERROR_NOPRINCIPALS "Failed to get principals." #define LOAD_ERROR_NOSPEC "Failed to get URI spec. This is bad." #define LOAD_ERROR_CONTENTTOOBIG "ContentLength is too large" // We just use the same reporter as the component loader extern void mozJSLoaderErrorReporter(JSContext *cx, const char *message, JSErrorReport *rep); mozJSSubScriptLoader::mozJSSubScriptLoader() : mSystemPrincipal(nullptr) { // Force construction of the JS component loader. We may need it later. nsCOMPtr componentLoader = do_GetService(MOZJSCOMPONENTLOADER_CONTRACTID); } mozJSSubScriptLoader::~mozJSSubScriptLoader() { /* empty */ } NS_IMPL_THREADSAFE_ISUPPORTS1(mozJSSubScriptLoader, mozIJSSubScriptLoader) static nsresult ReportError(JSContext *cx, const char *msg) { JS_SetPendingException(cx, STRING_TO_JSVAL(JS_NewStringCopyZ(cx, msg))); return NS_OK; } nsresult mozJSSubScriptLoader::ReadScript(nsIURI *uri, JSContext *cx, JSObject *targetObjArg, const nsAString& charset, const char *uriStr, nsIIOService *serv, nsIPrincipal *principal, bool reuseGlobal, JSScript **scriptp, JSFunction **functionp) { RootedObject target_obj(cx, targetObjArg); nsCOMPtr chan; nsCOMPtr instream; JSErrorReporter er; *scriptp = nullptr; *functionp = nullptr; nsresult rv; // Instead of calling NS_OpenURI, we create the channel ourselves and call // SetContentType, to avoid expensive MIME type lookups (bug 632490). rv = NS_NewChannel(getter_AddRefs(chan), uri, serv, nullptr, nullptr, nsIRequest::LOAD_NORMAL); if (NS_SUCCEEDED(rv)) { chan->SetContentType(NS_LITERAL_CSTRING("application/javascript")); rv = chan->Open(getter_AddRefs(instream)); } if (NS_FAILED(rv)) { return ReportError(cx, LOAD_ERROR_NOSTREAM); } int64_t len = -1; rv = chan->GetContentLength(&len); if (NS_FAILED(rv) || len == -1) { return ReportError(cx, LOAD_ERROR_NOCONTENT); } if (len > INT32_MAX) { return ReportError(cx, LOAD_ERROR_CONTENTTOOBIG); } nsCString buf; rv = NS_ReadInputStreamToString(instream, buf, len); if (NS_FAILED(rv)) return rv; /* set our own error reporter so we can report any bad things as catchable * exceptions, including the source/line number */ er = JS_SetErrorReporter(cx, mozJSLoaderErrorReporter); JS::CompileOptions options(cx); options.setPrincipals(nsJSPrincipals::get(principal)) .setFileAndLine(uriStr, 1); if (!charset.IsVoid()) { nsString script; rv = nsScriptLoader::ConvertToUTF16(nullptr, reinterpret_cast(buf.get()), len, charset, nullptr, script); if (NS_FAILED(rv)) { return ReportError(cx, LOAD_ERROR_BADCHARSET); } if (!reuseGlobal) { *scriptp = JS::Compile(cx, target_obj, options, reinterpret_cast(script.get()), script.Length()); } else { *functionp = JS::CompileFunction(cx, target_obj, options, nullptr, 0, nullptr, reinterpret_cast(script.get()), script.Length()); } } else { // We only use LAZY_SOURCE when no special encoding is specified because // the lazy source loader doesn't know the encoding. if (!reuseGlobal) { options.setSourcePolicy(JS::CompileOptions::LAZY_SOURCE); *scriptp = JS::Compile(cx, target_obj, options, buf.get(), len); } else { *functionp = JS::CompileFunction(cx, target_obj, options, nullptr, 0, nullptr, buf.get(), len); } } /* repent for our evil deeds */ JS_SetErrorReporter(cx, er); return NS_OK; } NS_IMETHODIMP mozJSSubScriptLoader::LoadSubScript(const nsAString& url, const JS::Value& target, const nsAString& charset, JSContext* cx, JS::Value* retval) { /* * Loads a local url and evals it into the current cx * Synchronous (an async version would be cool too.) * url: The url to load. Must be local so that it can be loaded * synchronously. * target_obj: Optional object to eval the script onto (defaults to context * global) * returns: Whatever jsval the script pointed to by the url returns. * Should ONLY (O N L Y !) be called from JavaScript code. */ nsresult rv = NS_OK; /* set the system principal if it's not here already */ if (!mSystemPrincipal) { nsCOMPtr secman = do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID); if (!secman) return NS_OK; rv = secman->GetSystemPrincipal(getter_AddRefs(mSystemPrincipal)); if (NS_FAILED(rv) || !mSystemPrincipal) return rv; } RootedObject targetObj(cx); mozJSComponentLoader* loader = mozJSComponentLoader::Get(); rv = loader->FindTargetObject(cx, &targetObj); NS_ENSURE_SUCCESS(rv, rv); bool reusingGlobal = !JS_IsGlobalObject(targetObj); // We base reusingGlobal off of what the loader told us, but we may not // actually be using that object. RootedObject passedObj(cx); if (!JS_ValueToObject(cx, target, passedObj.address())) return NS_ERROR_ILLEGAL_VALUE; if (passedObj) targetObj = passedObj; // Remember an object out of the calling compartment so that we // can properly wrap the result later. nsCOMPtr principal = mSystemPrincipal; RootedObject result_obj(cx, targetObj); targetObj = JS_FindCompilationScope(cx, targetObj); if (!targetObj) return NS_ERROR_FAILURE; if (targetObj != result_obj) { nsCOMPtr secman = do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID); if (!secman) return NS_ERROR_FAILURE; rv = secman->GetObjectPrincipal(cx, targetObj, getter_AddRefs(principal)); NS_ENSURE_SUCCESS(rv, rv); } JSAutoCompartment ac(cx, targetObj); /* load up the url. From here on, failures are reflected as ``custom'' * js exceptions */ nsCOMPtr uri; nsAutoCString uriStr; nsAutoCString scheme; RootedScript script(cx); // Figure out who's calling us if (!JS_DescribeScriptedCaller(cx, script.address(), nullptr)) { // No scripted frame means we don't know who's calling, bail. return NS_ERROR_FAILURE; } // Suppress caching if we're compiling as content. StartupCache* cache = (principal == mSystemPrincipal) ? StartupCache::GetSingleton() : nullptr; nsCOMPtr serv = do_GetService(NS_IOSERVICE_CONTRACTID); if (!serv) { return ReportError(cx, LOAD_ERROR_NOSERVICE); } // Make sure to explicitly create the URI, since we'll need the // canonicalized spec. rv = NS_NewURI(getter_AddRefs(uri), NS_LossyConvertUTF16toASCII(url).get(), nullptr, serv); if (NS_FAILED(rv)) { return ReportError(cx, LOAD_ERROR_NOURI); } rv = uri->GetSpec(uriStr); if (NS_FAILED(rv)) { return ReportError(cx, LOAD_ERROR_NOSPEC); } rv = uri->GetScheme(scheme); if (NS_FAILED(rv)) { return ReportError(cx, LOAD_ERROR_NOSCHEME); } if (!scheme.EqualsLiteral("chrome")) { // This might be a URI to a local file, though! nsCOMPtr innerURI = NS_GetInnermostURI(uri); nsCOMPtr fileURL = do_QueryInterface(innerURI); if (!fileURL) { return ReportError(cx, LOAD_ERROR_URI_NOT_LOCAL); } // For file URIs prepend the filename with the filename of the // calling script, and " -> ". See bug 418356. nsAutoCString tmp(JS_GetScriptFilename(cx, script)); tmp.AppendLiteral(" -> "); tmp.Append(uriStr); uriStr = tmp; } bool writeScript = false; JSVersion version = JS_GetVersion(cx); nsAutoCString cachePath; cachePath.AppendPrintf("jssubloader/%d", version); PathifyURI(uri, cachePath); RootedFunction function(cx); script = nullptr; if (cache) rv = ReadCachedScript(cache, cachePath, cx, mSystemPrincipal, script.address()); if (!script) { rv = ReadScript(uri, cx, targetObj, charset, static_cast(uriStr.get()), serv, principal, reusingGlobal, script.address(), function.address()); writeScript = !!script; } if (NS_FAILED(rv) || (!script && !function)) return rv; if (function) { script = JS_GetFunctionScript(cx, function); } loader->NoteSubScript(script, targetObj); bool ok = false; if (function) { ok = JS_CallFunction(cx, targetObj, function, 0, nullptr, retval); } else { ok = JS_ExecuteScriptVersion(cx, targetObj, script, retval, version); } if (ok) { JSAutoCompartment rac(cx, result_obj); if (!JS_WrapValue(cx, retval)) return NS_ERROR_UNEXPECTED; } if (cache && ok && writeScript) { WriteCachedScript(cache, cachePath, cx, mSystemPrincipal, script); } return NS_OK; }